• Title/Summary/Keyword: Attribute Matching

Search Result 58, Processing Time 0.028 seconds

Study on the EDA based Statistics Attributes Discovery and Utilization for the Maritime Safety Statistics Items Diversification (해상안전 통계 항목 다양화를 위한 EDA 기반 통계 속성 도출 및 활용에 관한 연구)

  • Kang, Seong Kyung;Lee, Young Jai
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.798-809
    • /
    • 2020
  • Evidence-based policymaking and assessments for scientific administration have increased the importance of statistics (data) utilization. Statistics can explain specific phenomena by providing numerical values and are a public resource for national decision making. Due to these inherent attributes, statistics are utilized as baseline and base data for government policy determinations and the analysis of various phenomena. However, compared to the importance, the role of statistics is limited, and statistics are often used as simple abstracts, produced mainly for suppliers, not for consumers' perspectives to create value. This study explores the statistical data and other attributes that can be utilized for policies or research to address the problems mentioned above. The baseline statistical data used in this study is from the Maritime Distress Accident Statistical Yearbook published by the South Korean Coast Guard, and other additional attributes are from text analyses of vessel casualty situation reports from the South Korean Maritime Police. Collecting 56 attributes drawn from the text analysis and executing an EDA resulted in 88 attribute unions: 18 attribute unions had a satisfactory significance probability (p-value < .05) and a strong correlation coefficient above 0.7, and 70 attribute unions had a middle correlation. (over 0.4 and under 0.7). Additionally, to utilize the extra attributes discovered from the EDA politically, a keyword analysis for each detailed strategy of the disaster Preparation basic plan was executed, the utilization availability of the attributes was obtained using a matching process of keywords, and the EDA deducted attributes were examined.

Cluster Analysis with Balancing Weight on Mixed-type Data

  • Chae, Seong-San;Kim, Jong-Min;Yang, Wan-Youn
    • Communications for Statistical Applications and Methods
    • /
    • v.13 no.3
    • /
    • pp.719-732
    • /
    • 2006
  • A set of clustering algorithms with proper weight on the formulation of distance which extend to mixed numeric and multiple binary values is presented. A simple matching and Jaccard coefficients are used to measure similarity between objects for multiple binary attributes. Similarities are converted to dissimilarities between i th and j th objects. The performance of clustering algorithms with balancing weight on different similarity measures is demonstrated. Our experiments show that clustering algorithms with application of proper weight give competitive recovery level when a set of data with mixed numeric and multiple binary attributes is clustered.

A Study on Designing Schemata with RDF for Interoperability of Metadata Formats (메타데이터 연계성을 위한 RDF 응용스키마설계에 관한 연구)

  • 김이겸;김태수
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.1
    • /
    • pp.21-47
    • /
    • 2000
  • Keeping the semantic interoperability between different formats is very important for reuseing and consistently processing metadata. This article is to design common schema and KORMARC schema based on RDF schema. For this, common elements are made by comparison of Dublin Core elements and KORMARC fields. The schema of these elements is designed for construction of semantic interoperability, basing RDF schema specification and syntax specification. Eventually, the semantic interoperability between a number of metadata formats can be constructed by matching the common elements to each attribute of format. KORMARC schema is designed by the application of common schema.

  • PDF

Global Feature Extraction and Recognition from Matrices of Gabor Feature Faces

  • Odoyo, Wilfred O.;Cho, Beom-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.207-211
    • /
    • 2011
  • This paper presents a method for facial feature representation and recognition from the Covariance Matrices of the Gabor-filtered images. Gabor filters are a very powerful tool for processing images that respond to different local orientations and wave numbers around points of interest, especially on the local features on the face. This is a very unique attribute needed to extract special features around the facial components like eyebrows, eyes, mouth and nose. The Covariance matrices computed on Gabor filtered faces are adopted as the feature representation for face recognition. Geodesic distance measure is used as a matching measure and is preferred for its global consistency over other methods. Geodesic measure takes into consideration the position of the data points in addition to the geometric structure of given face images. The proposed method is invariant and robust under rotation, pose, or boundary distortion. Tests run on random images and also on publicly available JAFFE and FRAV3D face recognition databases provide impressively high percentage of recognition.

Recognizing 3D Object's Attribute with Template Matching from RGB-D Images (RGB-D 영상으로부터 형판 정합을 이용한 3차원 물체의 속성 인식)

  • Kim, Dong-Ha;Kim, Joo-Hee;Im, Tae-Kwon;Kim, In-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.766-769
    • /
    • 2015
  • 본 논문에서는 컬러 영상과 깊이 영상으로부터 영상 전체의 정보를 활용하는 형판 정합 방법으로 특징을 추출하여, 사물의 속성을 인식하는 시스템을 제안한다. 본 시스템은 입력 영상으로부터 더 많은 정보를 얻기 위해 컬러 영상과 깊이 영상을 함께 사용하였다. 그리고 영상의 부분적인 정보가 아닌 전체 정보를 활용하는 형판 정합 방법을 사용하여 속성 인식률을 향상 시켰다. 본 시스템의 성능을 확인하기 위해 워싱턴 대학에서 제공하는 RGB-D 데이터 집합을 이용하여 다른 특징들 및 분류기와 비교실험을 진행하였고, 본 논문에서 제안하는 시스템의 높은 성능을 확인할 수 있었다.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

A Study of Integrating ASP Databases with Customer Databases (ASP 용의 데이터베이스와 고객 데이터베이스 연동에 관한 연구)

  • Kim, Ho-Yoon;Lee, Jae-Won
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1063-1072
    • /
    • 2004
  • In the ASP(Application Service Provider) business, applications using database sometimes require some data from clients' databases. These days such data are extracted from client database using manual database operations as an EXCEL file and the ASP, once receiving this file, transfers it into the application's database using manual database operations. This paper describes how to deal with data transmitting between the client database and ASP database on the web without using database manual operations for data extraction and insertion. We propose a framework which enables to transmit client data in a systematical way, to match different attribute names of each database for sharing same attribute values, and to avoid exposing information about the network path of client database to the ASP. This approach consists of two steps of data processing. The first is extracting data from client database as XML format by using a downloaded client program from ASP site, the second is uploading and storing the XML file into the ASP database. The implemented prototype system shows the suggested data integration paradigm is valid and ASP business needing integration of client database can be activated using it.

Design of Smart Platform based on Image Recognition for Lifelog (라이프로그용 영상인식 기반의 스마트 플랫폼 설계)

  • Choi, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.51-55
    • /
    • 2017
  • In this paper, we designed a LBS-based smart platform for Lifelog service that can utilize the other's lifelog information. The conventional Lifelog service means that the system records the daily activities of the smart device user so the user can retrieve the early-recorded information later. The proposed Lifelog service platform uses the GPS/UFID location information and the various information extracted from the image as the lifelog data. Further, the proposed Lifelog platform using DB can provide the user with the Lifelog data recorded by the other service user. The system usually provide the other's Lifelog data within the 500m distance from the user and the range of distance can be adjustable. The proposed smart platform based on image recognition for Lifelog can acquire the image from the smart device directly and perform the various image recognition processing to produce the useful image attributes. And it can store the location information, image data, image attributes and the relevant web informations on the database that can be retrieved by the other use's request. The attributes stored and managed in the image information database consist of the followings: Object ID, the image type, the capture time and the image GPS coordinates. The image type attribute has the following values: the mountain, the sea, the street, the front of building, the inside of building and the portrait. The captured image can be classified into the above image type by the pattern matching image processing techniques and the user's direct selection as well. In case of the portrait-attribute, we can choose the multiple sub-attribute values from the shirt, pant, dress and accessory sub-attributes. Managing the Lifelog data in the database, the system can provide the user with the useful additional services like a path finding to the location of the other service user's Lifelog data and information.

A Study on the Inspection of Digital Maps (수치지도 검수방안에 관한 연구)

  • 조윤숙;이종용;김명진;최현옥
    • Spatial Information Research
    • /
    • v.8 no.1
    • /
    • pp.31-50
    • /
    • 2000
  • In establishing the NGIS (The National Geographic Information System) , the Korean Government has been computerizing maps such as topographical maps as well as thematic maps. If the digital maps are mapped according to their use purpose, they can be efficiently used. The goals of this study is to describes the reasonable inspection process of digital maps. For these goals, quality controls and test processes of digital maps are investigated and then the error types of digital maps are analyzed. Nine standards which are data lineage, data format, positional accuracy, attribute accuracy, topology, logical consistency, edge-matching , completeness, outline range are established and nine steps, multi steps, which are making a work plan, analysing error types of digital maps, inspection with the naked eyes, a computerized inspection , a automatic inspection, the judge of results, the analysis of results are proposed.

  • PDF

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.